Site icon TheCyberThrone

Gravity RAT back in Action

Advertisements

Threat actors are distributing the GravityRAT  RAT masqueraded as an end-to-end encrypted chat application named SoSafe Chat. Back in 2020 , we have reviewed about its attacks.

GravityRAT is a malware strain known for checking the CPU temperature of Windows computers to avoid being executed in sandboxes and virtual machines. The recent campaign targets high-profile individuals in India disguising as a secure messaging app called ‘SoSafe Chat.’

Advertisements

The analysis of the source code of the app revealed the existence of a website (sosafe.co[.]in) used by the attackers. The site is still online, but the download link is no longer working and the registration option is not allowed.

Threat actors likely used the site to distribute the malware through malvertising campaign, or links shared via social media posts and chat messages.

The manifest shows the malware requests forty-two different permissions, the attackers could abuse thirteen permissions to perform the following actions:

Advertisements

Threat Actors constantly adapt their methods to avoid detection and find new ways to target users through sophisticated techniques. Such malicious applications often masquerade as legitimate applications to confuse users into installing them. Users should install applications only after verifying their authenticity and install them exclusively from the official Google Play Store to avoid such attacks.

Exit mobile version